Cyber Security: Hackers

Cyber Security: Hackers

3rd Grade

7 Qs

quiz-placeholder

Similar activities

For the Fortnite kids

For the Fortnite kids

KG - University

7 Qs

RECAP CHAP 1

RECAP CHAP 1

1st - 5th Grade

11 Qs

More about scratch

More about scratch

3rd - 6th Grade

10 Qs

The internet

The internet

3rd - 6th Grade

8 Qs

CIBERSEGURIDAD I

CIBERSEGURIDAD I

3rd Grade

10 Qs

VPN

VPN

1st - 5th Grade

10 Qs

IT Security

IT Security

3rd - 6th Grade

7 Qs

Computer Algorithm

Computer Algorithm

1st - 3rd Grade

10 Qs

Cyber Security: Hackers

Cyber Security: Hackers

Assessment

Quiz

Computers

3rd Grade

Medium

Created by

Adrianna Dar

Used 8+ times

FREE Resource

7 questions

Show all answers

1.

MATCH QUESTION

1 min • 1 pt

Match the following

Hacktivist

These hackers use their skills to promote political or social causes.

Grey Hat

These are ethical hackers who work to improve security.

Black Hat

These hackers fall between white hat and black hat hackers.

Social Engineer

These are malicious hackers who engage in illegal activities.

White Hat

These hackers use psychological manipulation to deceive individuals or gain unauthorized access.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of hacker rely on human interaction rather than technical exploits?

White Hat

Gtey Hat

Hacktivist

Social Engineer

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Social Engineers use impersonation and try to trick people into revealing

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Black Hat Hackers can engage in tasks such as:

unauthorised access to systems

stealing sensitive information

launching cyber attacks

testing system's vulnerabilities

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Grey Hat Hackers may engage in the following tasks:

exposing security flaws

testing system vulnerabilities

stealing personal data for financial use

blackmailing the organisation to control it

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

White Hat Hacker may engage in the following tasks:

testing system vulnerabilities

conducting security audits

identify weaknesses in a system

provide recommendations to enhance the security

7.

DRAG AND DROP QUESTION

1 min • 1 pt

​ (a)   tasks involve defacing websites, leaking ​ (b)   information, or ​ (c)   online services to draw ​ (d)   to their cause.

Hacktivist
sensitive
disrupting
attention